Please turn on your JavaScript for this page to function normally.
healthcare
Health insurers facing growing risk of customer data theft

The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …

tunnel
What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

Tor Browser
Tor Browser 10.5 improves circumvention for Tor users in censored places

The Tor Project has brought major censorship circumvention and usability changes to the latest release of Tor Browser. The Tor team is on a mission to make Tor easier to use …

fix
How health tech can secure patient data post-CURES Act

It’s the central conundrum at the heart of telehealth: How can patients gain access to their most vital medical records without putting privacy at risk? The question is not …

speed
Online brands prioritizing speed over security

Consumers around the world fear that businesses are now compromising online security in their efforts to deliver seamless digital experiences. According to a research released …

Good
Cybersecurity posture confidence high, yet incidents are increasing too

IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …

encryption
Enhancing cloud security with a two-step cryptography technique

The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …

compliance
Chief Compliance Officers must embrace new leadership responsibilities

As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

mobile security
Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

Google Workspace
A closer look at Google Workspace privacy and data security

Google recently unveiled the next evolution of Google Workspace, including new security and privacy capabilities to help users take advantage of trusted, cloud-native …

privacy
Many companies believe it is important to protect employee privacy, yet few are effective in doing so

DTEX Systems released a report which revealed a significant workforce privacy gap. The report, conducted by the Ponemon Institute, surveyed a global pool of 1,249 IT and IT …

data
SMEs strongly positioned in the data protection sector

Small and medium-sized enterprises seem to be strongly positioned in the data protection sector, according to a recent survey of 600 German, French and British executives …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools